[TALK]@Telematika
Telematika.ORG
Resources
Group
Search
About
NANOG73
Keynote: Operations first, feature second Philosophy
February 9, 2020
Recently there was a blog post on Linkedin talking about the skills required to be a successful network engineer in the future. While the skills listed were all re …
Memcached amplification: lessons learned
February 9, 2020
In November 2017, researchers have found a new class of amplification DDoS attacks: the memcached amplification. Soon after the discovery, at the beginning of Marc …
Preventing (Network) Time Travel with Chronos
February 9, 2020
The Network Time Protocol (NTP) synchronizes time across computer systems over the Internet. Unfortunately, NTP is highly vulnerable to time shifting attacks, in …
SNMP is dead
February 9, 2020
Modern networks have significantly outpaced the monitoring capabilities of SNMP and command-line scraping. Over the last three years we at Google have been workin …
T-Mobile's journey to IPv6 Only networking
February 9, 2020
Over the last 10 years, T-Mobile have had a strategy of removing our dependency of IPv4. In the spring of 2017 we finally flipped the switch and turned off IPv4 fo …
The Full Edward: Meet our new Executive Director: Edward McNair
February 9, 2020
It will be my pleasure to introduce our new ED, Edward McNair, to the community. I will start with a 1:1 interview of Edward to help the audience get to know him a …
A reflection of Time Spent at NANOG
February 8, 2020
A reflection of NANOG and time as Executive Director …
Flowspec for BGP Route Servers at IXPs
February 8, 2020
BIRD is a widely deployed software for BGP route servers at IXPs. The release of version 2.0.2 in March added support for BGP Flow Specification (RFC 5575). While …
RIFT (Routing In Fat Trees) for Hyperscale Datacenters
February 8, 2020
RIFT (Routing In Fat-Trees) is being designed as next-gen routing protocol optimized for leaf/spine architectures, taking advantage of somewhat deterministic netwo …
Routing Is At Risk. Let's Secure It Together.
February 8, 2020
Stolen cryptocurrency, hijacked traffic blocking access to whole countries, derailing vital Web resources for thousands of people. Routing used to fly under the ra …
Segment Routing for DCI
February 8, 2020
Abstract: This talk will cover two talk tracks into a single presentation. First, a technology overview of applicable Segment Routing (SR) components for an IXP ne …
Segment Routing: the stuff marketing doesnt talk about
February 8, 2020
Over the past few years, Segment Routing has received a considerable amount of attention for enabling a range of novel new network capabilities. While Segment Rout …
The Single Source of Truth for Network Automation
February 8, 2020
How a single source of truth, expressed as an elegant data model, can operate an Internet business' process and network automation. Many automation presentations t …
Architecting Robust BGP Routing Policies
February 7, 2020
What actually makes good routing policies "good"? At NANOG we've mostly focused on teaching each other how to implement one or another BGP feature in our networks, …
EVPN for Everyone Else - Evolved Campus Core
February 7, 2020
Today when you hear someone talk about EVPN/VXLAN it's more than likely in the context of a DataCenter. This session will address another use case and a novel way …
Lightning Talk: BGP Transport Security - Do You Care?
February 7, 2020
How many of you use MD5 for BGP sessions? And for what purpose? Isnt MD5 authentication really just a longer form of peer identifier to avoid accidentally estab …
Lightning Talk: Legal Barriers to Securing the Routing Architecture
February 7, 2020
This short presentation is meant to solicit NANOG community feedback on one aspect of Internet routing: the adoption of the Resource Public Key Infrastructure fram …
Lightning Talk: Submarine Cable Status Map
February 7, 2020
We are all aware of the amazing www.submarinecablemap.com which we use many times planning our network and various other reasons. I am putting together with my own …
Packet-Level Network Analytics without Compromises
February 7, 2020
Network analytics has been a key component of network management for decades. As we look to integrate more intelligence, whether for increased security or to bette …
"Multicloud" - the next generation cloud infrastructure
February 6, 2020
So, what are data center networks really built for? Short answer "applications". Whether it is a public cloud provider, private enterprise, FSI or telco cloud - th …
Choose your own adventure: Networking professionals roads to success.
February 6, 2020
Every path to success is different and the diverse community of networking professionals NANOG is an excellent example of that. We have the opportunity to help and …
DDoS evolution and enhancing DDoS protection with BGP flowspec
February 6, 2020
Provide a brief review of DDoS and DDoS evolution over the last few years. Describe new attack vectors, such as memcache and Carpet Bombing. Explain how flowspec c …
Hackathon Recap
February 6, 2020
We'll use a 30 minute slot for our sponsor to do a presentation of the Sunday Hackathon, and introduce the winning teams. …
Scaling the Facebook backbone through Zero Touch Provisioning (ZTP)
February 6, 2020
Zero Touch Provisioning is a method of configuring network devices through DHCP from a factory-blank state. In response to a DHCP-DISCOVER, a device is given eithe …
The State of Traffic Engineering - an ISP's Perspective
February 6, 2020
This talk will go over the current state of the major Traffic Engineering solutions (starting with basic static routing and working through IGP as MED, AIGP, RSVP- …
Lightning Talk: Automated DDOS Protection for our National Service-Provider Backbone (that lets our engineers sleep at night)
February 5, 2020
At Flexential (formerly Peak10 + Viawest) we created an automated DDOS detection/mitigation solution that protects all company and customer IP assets across all of …
Lightning Talk: Securing Physical Access to Systems, Networks and Data
February 5, 2020
Information Security is a complicated and well discussed topic. InfoSec is vitally important and one weak link can break the chain. Less popular these days is disc …
SDN Controllers in the WAN: protocols and applications
February 5, 2020
Some operators have recently been deploying SDN Controllers in the WAN for the first time. This presentation discusses the protocols needed to underpin a quasi-rea …
# 1 of 2
Prev